Foreword |
|
xxiv | |
Preface |
|
xxvi | |
Introduction |
|
xxviii | |
Instructor Web Site |
|
xxxi | |
Chapter 1 Introduction and Security Trends |
|
1 | (21) |
|
The Computer Security Problem |
|
|
1 | (7) |
|
Definition of Computer Security |
|
|
1 | (1) |
|
Historical Security Incidents |
|
|
1 | (3) |
|
The Current Threat Environment |
|
|
4 | (3) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (5) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
Nation-States, Terrorists, and Information Warfare |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
Minimizing Possible Avenues of Attack |
|
|
15 | (1) |
|
Approaches to Computer Security |
|
|
16 | (2) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (3) |
Chapter 2 General Security Concepts |
|
22 | (24) |
|
Basic Security Terminology |
|
|
23 | (14) |
|
|
23 | (4) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (8) |
|
|
37 | (4) |
|
|
38 | (1) |
|
|
39 | (2) |
|
|
41 | (1) |
|
|
42 | (4) |
Chapter 3 Operational and Organizational Security |
|
46 | (26) |
|
Policies, Procedures, Standards, and Guidelines |
|
|
47 | (14) |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
49 | (2) |
|
Password and Account Policies |
|
|
51 | (2) |
|
|
53 | (7) |
|
Due Care and Due Diligence |
|
|
60 | (1) |
|
|
61 | (1) |
|
Incident Response Policies and Procedures |
|
|
61 | (1) |
|
Security Awareness and Training |
|
|
61 | (5) |
|
Security Policy Training and Procedures |
|
|
62 | (1) |
|
|
62 | (2) |
|
|
64 | (1) |
|
Compliance with Laws, Best Practices, and Standards |
|
|
64 | (1) |
|
|
64 | (1) |
|
Training Metrics and Compliance |
|
|
65 | (1) |
|
Standard Operating Procedure |
|
|
66 | (1) |
|
Interoperability Agreements |
|
|
66 | (1) |
|
|
66 | (1) |
|
Business Partnership Agreement |
|
|
67 | (1) |
|
Memorandum of Understanding |
|
|
67 | (1) |
|
Interconnection Security Agreement |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
67 | (2) |
|
|
69 | (3) |
Chapter 4 The Role of People in Security |
|
72 | (20) |
|
People-A Security Problem |
|
|
73 | (12) |
|
|
73 | (1) |
|
|
74 | (6) |
|
|
80 | (5) |
|
People as a Security Tool |
|
|
85 | (3) |
|
|
85 | (2) |
|
Security Policy Training and Procedures |
|
|
87 | (1) |
|
|
88 | (4) |
Chapter 5 Cryptography |
|
92 | (30) |
|
|
93 | (2) |
|
|
94 | (1) |
|
Comparative Strengths and Performance of Algorithms |
|
|
95 | (1) |
|
|
95 | (2) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
Security Through Obscurity |
|
|
96 | (1) |
|
|
97 | (5) |
|
|
97 | (1) |
|
|
98 | (3) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
102 | (4) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
106 | (6) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (1) |
|
Symmetric Encryption Summary |
|
|
112 | (1) |
|
|
112 | (6) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
Asymmetric Encryption Summary |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (3) |
Chapter 6 Applied Cryptography |
|
122 | (34) |
|
|
123 | (4) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
Digital Rights Management |
|
|
125 | (1) |
|
Cryptographic Applications |
|
|
126 | (1) |
|
Use of Proven Technologies |
|
|
127 | (1) |
|
|
127 | (8) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
Implementation vs. Algorithm Selection |
|
|
133 | (1) |
|
|
133 | (2) |
|
|
135 | (1) |
|
|
135 | (2) |
|
|
136 | (1) |
|
IETF S/MIME v3 Specifications |
|
|
136 | (1) |
|
|
137 | (3) |
|
|
138 | (2) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
140 | (2) |
|
|
142 | (3) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
Secure Protocol Use Cases |
|
|
145 | (2) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
Network Address Allocation |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (4) |
|
|
147 | (1) |
|
Known Plaintext/Ciphertext |
|
|
147 | (1) |
|
Meet-in-the-Middle Attacks |
|
|
148 | (1) |
|
|
148 | (2) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (2) |
|
|
151 | (1) |
|
|
151 | (1) |
|
ISO/IEC 27002 (Formerly ISO 17799) |
|
|
151 | (2) |
|
|
153 | (3) |
Chapter 7 Public Key Infrastructure |
|
156 | (48) |
|
The Basics of Public Key Infrastructures |
|
|
157 | (1) |
|
|
158 | (5) |
|
|
159 | (1) |
|
Local Registration Authorities |
|
|
160 | (1) |
|
Public Certificate Authorities |
|
|
160 | (1) |
|
In-house Certificate Authorities |
|
|
161 | (1) |
|
Choosing Between a Public CA and an In-house CA |
|
|
161 | (1) |
|
Outsourced Certificate Authorities |
|
|
161 | (2) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (6) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
Walking the Certificate Path |
|
|
168 | (1) |
|
|
169 | (8) |
|
|
170 | (2) |
|
|
172 | (1) |
|
|
173 | (3) |
|
|
176 | (1) |
|
|
177 | (5) |
|
Registration and Generation |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (3) |
|
|
182 | (1) |
|
|
182 | (3) |
|
|
183 | (1) |
|
Trust and Certificate Verification |
|
|
183 | (2) |
|
Centralized and Decentralized Infrastructures |
|
|
185 | (5) |
|
Hardware Security Modules |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
Certificate-Based Threats |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (4) |
|
|
192 | (1) |
|
|
193 | (2) |
|
Why You Need to Know the PKIX and PKCS Standards |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
199 | (5) |
Chapter 8 Physical Security |
|
204 | (30) |
|
|
205 | (3) |
|
Physical Security Safeguards |
|
|
208 | (15) |
|
|
208 | (3) |
|
Physical Access Controls and Monitoring |
|
|
211 | (6) |
|
Electronic Access Control Systems |
|
|
217 | (1) |
|
|
218 | (5) |
|
|
223 | (1) |
|
|
224 | (3) |
|
Water-Based Fire Suppression Systems |
|
|
224 | (1) |
|
Halon-Based Fire Suppression Systems |
|
|
224 | (1) |
|
Clean-Agent Fire Suppression Systems |
|
|
225 | (1) |
|
Handheld Fire Extinguishers |
|
|
225 | (1) |
|
|
226 | (1) |
|
Electromagnetic Environment |
|
|
227 | (1) |
|
|
228 | (2) |
|
|
228 | (1) |
|
Backup Power and Cable Shielding |
|
|
229 | (1) |
|
|
230 | (4) |
Chapter 9 Network Fundamentals |
|
234 | (42) |
|
|
235 | (1) |
|
|
236 | (2) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
238 | (3) |
|
|
238 | (2) |
|
|
240 | (1) |
|
|
241 | (6) |
|
|
241 | (2) |
|
|
243 | (2) |
|
|
245 | (2) |
|
|
247 | (3) |
|
|
248 | (1) |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
250 | (9) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
252 | (3) |
|
IP Addresses and Subnetting |
|
|
255 | (2) |
|
Network Address Translation |
|
|
257 | (2) |
|
|
259 | (1) |
|
|
259 | (4) |
|
|
259 | (2) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
263 | (1) |
|
|
263 | (1) |
|
Segregation/Segmentation/Isolation |
|
|
263 | (4) |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
Security Device/Technology Placement |
|
|
268 | (3) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
270 | (1) |
|
|
270 | (1) |
|
|
270 | (1) |
|
|
270 | (1) |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
273 | (3) |
Chapter 10 Infrastructure Security |
|
276 | (42) |
|
|
277 | (2) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
278 | (1) |
|
Device Security, Common Concerns |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
279 | (3) |
|
|
279 | (1) |
|
Application Cells/Containers |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
281 | (1) |
|
|
281 | (1) |
|
|
282 | (1) |
|
Host Availability/Elasticity |
|
|
282 | (1) |
|
|
282 | (1) |
|
|
282 | (1) |
|
|
282 | (12) |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
286 | (2) |
|
|
288 | (2) |
|
Next-Generation Firewalls |
|
|
290 | (1) |
|
Web Application Firewalls vs. Network Firewalls |
|
|
291 | (1) |
|
|
291 | (1) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
293 | (1) |
|
|
294 | (7) |
|
Intrusion Detection Systems |
|
|
294 | (1) |
|
|
294 | (1) |
|
Network Monitoring/Diagnostic |
|
|
295 | (1) |
|
|
296 | (1) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
299 | (1) |
|
|
299 | (1) |
|
Unified Threat Management |
|
|
299 | (2) |
|
|
301 | (4) |
|
|
301 | (1) |
|
|
301 | (2) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
305 | (5) |
|
|
305 | (2) |
|
|
307 | (1) |
|
|
308 | (2) |
|
Security Concerns for Transmission Media |
|
|
310 | (1) |
|
Physical Security Concerns |
|
|
310 | (1) |
|
|
311 | (2) |
|
|
311 | (1) |
|
Cloud Computing Service Models |
|
|
312 | (1) |
|
|
313 | (1) |
|
On-premises vs. Hosted vs. Cloud |
|
|
313 | (1) |
|
|
314 | (1) |
|
Cloud Access Security Broker |
|
|
314 | (1) |
|
|
315 | (3) |
Chapter 11 Authentication and Remote Access |
|
318 | (56) |
|
User, Group, and Role Management |
|
|
319 | (4) |
|
|
319 | (2) |
|
Shared and Generic Accounts/Credentials |
|
|
321 | (1) |
|
|
321 | (1) |
|
|
321 | (1) |
|
|
321 | (1) |
|
|
321 | (1) |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
324 | (1) |
|
Security Controls and Permissions |
|
|
325 | (7) |
|
|
327 | (2) |
|
Mandatory Access Control (MAC) |
|
|
329 | (1) |
|
Discretionary Access Control (DAC) |
|
|
329 | (2) |
|
Role-Based Access Control (RBAC) |
|
|
331 | (1) |
|
Rule-Based Access Control |
|
|
331 | (1) |
|
Attribute-Based Access Control (ABAC) |
|
|
332 | (1) |
|
|
332 | (3) |
|
Account Policy Enforcement |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
Standard Naming Convention |
|
|
333 | (1) |
|
|
333 | (1) |
|
Usage Auditing and Review |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
Preventing Data Loss or Theft |
|
|
335 | (1) |
|
The Remote Access Process |
|
|
335 | (14) |
|
|
336 | (1) |
|
|
337 | (5) |
|
Multifactor Authentication |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
344 | (4) |
|
|
348 | (1) |
|
|
349 | (16) |
|
|
349 | (1) |
|
|
350 | (1) |
|
|
351 | (2) |
|
|
353 | (3) |
|
|
356 | (7) |
|
|
363 | (1) |
|
|
363 | (1) |
|
Vulnerabilities of Remote Access Methods |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
367 | (1) |
|
|
368 | (6) |
Chapter 12 Wireless Security and Mobile Devices |
|
374 | (50) |
|
Introduction to Wireless Networking |
|
|
375 | (1) |
|
|
376 | (5) |
|
Wireless Application Protocol |
|
|
377 | (2) |
|
|
379 | (1) |
|
|
380 | (1) |
|
|
381 | (1) |
|
|
381 | (1) |
|
|
382 | (1) |
|
|
382 | (1) |
|
Other Forms of Connection |
|
|
382 | (2) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
384 | (10) |
|
802.11: Individual Standards |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
388 | (3) |
|
|
391 | (3) |
|
Wireless Systems Configuration |
|
|
394 | (4) |
|
|
394 | (1) |
|
|
394 | (1) |
|
Controller Based vs. Standalone |
|
|
394 | (1) |
|
|
395 | (1) |
|
|
395 | (1) |
|
|
396 | (1) |
|
Antenna Types and Placement |
|
|
396 | (1) |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
398 | (1) |
|
|
398 | (1) |
|
|
398 | (1) |
|
|
398 | (4) |
|
|
399 | (1) |
|
|
399 | (1) |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
400 | (1) |
|
|
400 | (1) |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
401 | (1) |
|
|
402 | (1) |
|
Mobile Device Management Concepts |
|
|
402 | (6) |
|
|
403 | (1) |
|
Full Device Encryption (FDE) |
|
|
403 | (1) |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
Push Notification Services |
|
|
406 | (1) |
|
|
406 | (1) |
|
|
406 | (1) |
|
Context-Aware Authentication |
|
|
406 | (1) |
|
|
406 | (1) |
|
|
407 | (1) |
|
|
407 | (1) |
|
|
407 | (1) |
|
|
407 | (1) |
|
Disabling Unused Features |
|
|
408 | (1) |
|
Mobile Application Security |
|
|
408 | (2) |
|
|
408 | (1) |
|
Key and Credential Management |
|
|
408 | (1) |
|
|
409 | (1) |
|
|
409 | (1) |
|
|
409 | (1) |
|
Transitive Trust/Authentication |
|
|
409 | (1) |
|
Policies for Enforcement and Monitoring |
|
|
410 | (4) |
|
|
410 | (1) |
|
|
410 | (1) |
|
|
411 | (1) |
|
|
411 | (1) |
|
|
411 | (1) |
|
|
411 | (1) |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
413 | (1) |
|
|
413 | (1) |
|
|
413 | (1) |
|
|
413 | (1) |
|
|
414 | (1) |
|
|
414 | (5) |
|
|
414 | (1) |
|
|
414 | (1) |
|
|
414 | (1) |
|
|
415 | (3) |
|
|
418 | (1) |
|
|
419 | (5) |
Chapter 13 Intrusion Detection Systems and Network Security |
|
424 | (36) |
|
History of Intrusion Detection Systems |
|
|
425 | (1) |
|
|
426 | (4) |
|
|
427 | (2) |
|
|
429 | (1) |
|
False Positives and False Negatives |
|
|
430 | (1) |
|
|
430 | (6) |
|
|
434 | (1) |
|
|
434 | (1) |
|
|
434 | (1) |
|
|
435 | (1) |
|
|
436 | (5) |
|
|
439 | (1) |
|
|
440 | (1) |
|
|
440 | (1) |
|
Resurgence and Advancement of HIDSs |
|
|
441 | (1) |
|
Intrusion Prevention Systems |
|
|
441 | (2) |
|
Network Security Monitoring |
|
|
443 | (1) |
|
|
444 | (2) |
|
|
445 | (1) |
|
|
446 | (1) |
|
|
446 | (1) |
|
|
446 | (1) |
|
Automated Alerting and Triggers |
|
|
446 | (1) |
|
|
446 | (1) |
|
|
447 | (1) |
|
|
447 | (1) |
|
|
447 | (1) |
|
|
448 | (1) |
|
|
448 | (1) |
|
|
448 | (6) |
|
|
448 | (1) |
|
|
448 | (1) |
|
|
449 | (1) |
|
In-Band vs. Out-of-Band NIDS/NIPS |
|
|
450 | (1) |
|
|
451 | (1) |
|
|
451 | (2) |
|
|
453 | (1) |
|
|
454 | (1) |
|
|
454 | (2) |
|
|
456 | (1) |
|
|
456 | (1) |
|
|
457 | (3) |
Chapter 14 System Hardening and Baselines |
|
460 | (66) |
|
|
461 | (1) |
|
Hardware/Firmware Security |
|
|
461 | (3) |
|
|
461 | (1) |
|
|
461 | (1) |
|
|
462 | (1) |
|
|
462 | (1) |
|
|
462 | (1) |
|
Secure Boot and Attestation |
|
|
462 | (1) |
|
|
463 | (1) |
|
|
463 | (1) |
|
|
463 | (1) |
|
|
464 | (1) |
|
Operating System and Network Operating System Hardening |
|
|
464 | (6) |
|
|
464 | (1) |
|
|
465 | (1) |
|
|
465 | (1) |
|
|
466 | (1) |
|
|
467 | (1) |
|
Disabling Unnecessary Ports and Services |
|
|
468 | (1) |
|
|
468 | (1) |
|
Disable Default Accounts/Passwords |
|
|
469 | (1) |
|
Application Whitelisting/Blacklisting |
|
|
469 | (1) |
|
|
470 | (1) |
|
|
470 | (21) |
|
|
471 | (1) |
|
Hardening Microsoft Operating Systems |
|
|
472 | (5) |
|
Hardening UNIX- or Linux-Based Operating Systems |
|
|
477 | (3) |
|
|
480 | (7) |
|
Whitelisting vs. Blacklisting Applications |
|
|
487 | (1) |
|
|
488 | (1) |
|
|
488 | (3) |
|
|
491 | (1) |
|
|
491 | (3) |
|
|
492 | (1) |
|
|
492 | (1) |
|
Securing Management Interfaces |
|
|
493 | (1) |
|
|
493 | (1) |
|
|
494 | (1) |
|
|
494 | (1) |
|
|
494 | (6) |
|
Application Configuration Baseline |
|
|
494 | (1) |
|
|
495 | (1) |
|
|
495 | (3) |
|
|
498 | (1) |
|
|
498 | (2) |
|
Data-Based Security Controls |
|
|
500 | (3) |
|
|
500 | (1) |
|
|
501 | (1) |
|
|
502 | (1) |
|
|
502 | (1) |
|
|
502 | (1) |
|
|
503 | (1) |
|
|
503 | (1) |
|
|
503 | (1) |
|
|
503 | (1) |
|
|
503 | (1) |
|
|
504 | (1) |
|
|
504 | (4) |
|
Automated Courses of Action |
|
|
504 | (1) |
|
|
504 | (1) |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
506 | (1) |
|
|
506 | (1) |
|
|
507 | (1) |
|
|
507 | (1) |
|
|
508 | (1) |
|
|
508 | (1) |
|
|
508 | (9) |
|
Alternative Environment Methods |
|
|
508 | (1) |
|
|
508 | (2) |
|
Phones and Mobile Devices |
|
|
510 | (1) |
|
|
511 | (1) |
|
|
512 | (1) |
|
|
512 | (1) |
|
|
512 | (1) |
|
|
513 | (1) |
|
|
513 | (1) |
|
|
514 | (1) |
|
|
515 | (2) |
|
Industry-Standard Frameworks and Reference Architectures |
|
|
517 | (2) |
|
|
518 | (1) |
|
|
518 | (1) |
|
National vs. International |
|
|
518 | (1) |
|
Industry-Specific Frameworks |
|
|
519 | (1) |
|
Benchmarks/Secure Configuration Guides |
|
|
519 | (2) |
|
Platform/Vendor-Specific Guides |
|
|
519 | (2) |
|
|
521 | (1) |
|
|
521 | (1) |
|
|
522 | (4) |
Chapter 15 Types of Attacks and Malicious Software |
|
526 | (44) |
|
|
527 | (1) |
|
Minimizing Possible Avenues of Attack |
|
|
527 | (1) |
|
|
528 | (10) |
|
|
528 | (3) |
|
|
531 | (1) |
|
|
531 | (1) |
|
|
532 | (1) |
|
|
532 | (1) |
|
|
533 | (1) |
|
|
534 | (1) |
|
|
534 | (1) |
|
|
534 | (1) |
|
|
535 | (1) |
|
|
535 | (1) |
|
|
536 | (1) |
|
|
536 | (1) |
|
|
537 | (1) |
|
Application-Level Attacks |
|
|
537 | (1) |
|
Attacking Computer Systems and Networks |
|
|
538 | (24) |
|
Denial-of-Service Attacks |
|
|
538 | (4) |
|
|
542 | (1) |
|
|
542 | (1) |
|
|
542 | (1) |
|
|
543 | (4) |
|
|
547 | (1) |
|
|
547 | (1) |
|
Man-in-the-Middle Attacks |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
549 | (1) |
|
|
549 | (1) |
|
|
549 | (1) |
|
|
549 | (1) |
|
|
549 | (1) |
|
|
550 | (1) |
|
|
550 | (1) |
|
|
550 | (1) |
|
|
551 | (1) |
|
|
551 | (1) |
|
|
552 | (1) |
|
|
553 | (2) |
|
|
555 | (1) |
|
|
555 | (1) |
|
|
556 | (2) |
|
|
558 | (1) |
|
|
558 | (2) |
|
|
560 | (2) |
|
|
562 | (1) |
|
Advanced Persistent Threat |
|
|
562 | (1) |
|
|
563 | (1) |
|
|
563 | (1) |
|
|
563 | (1) |
|
Social-Engineering Toolkit |
|
|
563 | (1) |
|
|
564 | (1) |
|
|
564 | (1) |
|
|
564 | (1) |
|
|
564 | (3) |
|
Performing Routine Audits |
|
|
565 | (2) |
|
|
567 | (3) |
Chapter 16 E-mail and Instant Messaging |
|
570 | (24) |
|
|
571 | (3) |
|
|
572 | (2) |
|
|
574 | (1) |
|
|
574 | (5) |
|
|
575 | (1) |
|
|
576 | (2) |
|
|
578 | (1) |
|
|
579 | (6) |
|
|
579 | (3) |
|
|
582 | (1) |
|
|
583 | (1) |
|
Spam URI Real-time Block Lists |
|
|
583 | (1) |
|
Sender Policy Framework (SPF) |
|
|
584 | (1) |
|
|
584 | (1) |
|
DomainKeys Identified Mail |
|
|
584 | (1) |
|
|
584 | (1) |
|
|
585 | (4) |
|
|
585 | (2) |
|
|
587 | (2) |
|
|
589 | (2) |
|
Modern Instant Messaging Systems |
|
|
589 | (2) |
|
|
591 | (3) |
Chapter 17 Web Components |
|
594 | (30) |
|
Current Web Components and Concerns |
|
|
595 | (1) |
|
|
595 | (11) |
|
|
596 | (1) |
|
|
596 | (5) |
|
|
601 | (1) |
|
|
602 | (1) |
|
HTTP Strict Transport Security |
|
|
602 | (1) |
|
Directory Services (DAP and LDAP) |
|
|
603 | (1) |
|
File Transfer (FTP and SFTP) |
|
|
604 | (1) |
|
|
605 | (1) |
|
Code-Based Vulnerabilities |
|
|
606 | (11) |
|
|
606 | (1) |
|
|
607 | (1) |
|
|
608 | (1) |
|
|
609 | (1) |
|
|
610 | (1) |
|
|
610 | (1) |
|
|
611 | (1) |
|
|
611 | (3) |
|
|
614 | (1) |
|
|
615 | (1) |
|
|
616 | (1) |
|
Application-Based Weaknesses |
|
|
617 | (3) |
|
|
618 | (1) |
|
|
618 | (1) |
|
|
619 | (1) |
|
|
620 | (4) |
Chapter 18 Secure Software Development |
|
624 | (32) |
|
The Software Engineering Process |
|
|
625 | (8) |
|
|
625 | (1) |
|
Secure Development Lifecycle |
|
|
626 | (7) |
|
|
633 | (4) |
|
Error and Exception Handling |
|
|
633 | (1) |
|
Input and Output Validation |
|
|
633 | (1) |
|
|
634 | (2) |
|
|
636 | (1) |
|
|
637 | (6) |
|
|
637 | (1) |
|
|
638 | (2) |
|
Directory Traversal/Command Injection |
|
|
640 | (1) |
|
|
640 | (1) |
|
|
641 | (1) |
|
Cross-Site Request Forgery |
|
|
641 | (1) |
|
|
642 | (1) |
|
|
642 | (1) |
|
|
642 | (1) |
|
|
642 | (1) |
|
Arbitrary/Remote Code Execution |
|
|
643 | (1) |
|
Open Vulnerability and Assessment Language |
|
|
643 | (1) |
|
|
643 | (4) |
|
Application Configuration Baseline |
|
|
644 | (1) |
|
Application Patch Management |
|
|
644 | (1) |
|
NoSQL Databases vs. SQL Databases |
|
|
644 | (1) |
|
Server-Side vs. Client-Side Validation |
|
|
644 | (1) |
|
|
645 | (1) |
|
|
645 | (1) |
|
|
645 | (1) |
|
|
646 | (1) |
|
|
646 | (1) |
|
Use of Third-Party Libraries and SDKs |
|
|
646 | (1) |
|
|
647 | (1) |
|
|
647 | (3) |
|
|
647 | (1) |
|
Dynamic Analysis (Fuzzing) |
|
|
648 | (1) |
|
|
649 | (1) |
|
|
649 | (1) |
|
|
649 | (1) |
|
Compiled vs. Runtime Code |
|
|
650 | (1) |
|
|
650 | (2) |
|
|
650 | (1) |
|
|
651 | (1) |
|
|
651 | (1) |
|
|
651 | (1) |
|
|
651 | (1) |
|
Version Control and Change Management |
|
|
652 | (1) |
|
Provisioning and Deprovisioning |
|
|
652 | (1) |
|
|
652 | (1) |
|
|
653 | (3) |
Chapter 19 Business Continuity, Disaster Recovery, and Organizational Policies |
|
656 | (28) |
|
|
657 | (4) |
|
Disaster Recovery Plans/Process |
|
|
657 | (1) |
|
Categories of Business Functions |
|
|
658 | (1) |
|
|
659 | (1) |
|
Test, Exercise, and Rehearse |
|
|
659 | (1) |
|
Recovery Time Objective and Recovery Point Objective |
|
|
660 | (1) |
|
|
661 | (7) |
|
What Needs to Be Backed Up |
|
|
661 | (1) |
|
|
662 | (1) |
|
|
662 | (1) |
|
|
663 | (1) |
|
|
663 | (1) |
|
|
663 | (1) |
|
Backup Frequency and Retention |
|
|
664 | (2) |
|
|
666 | (1) |
|
Geographic Considerations |
|
|
666 | (2) |
|
|
668 | (5) |
|
Business Continuity Plans |
|
|
668 | (1) |
|
|
669 | (1) |
|
Identification of Critical Systems and Components |
|
|
669 | (1) |
|
Removing Single Points of Failure |
|
|
669 | (1) |
|
|
669 | (1) |
|
|
669 | (1) |
|
|
670 | (1) |
|
|
670 | (1) |
|
|
670 | (1) |
|
|
670 | (1) |
|
|
671 | (1) |
|
|
672 | (1) |
|
|
672 | (1) |
|
|
673 | (1) |
|
|
673 | (1) |
|
|
674 | (5) |
|
|
674 | (1) |
|
|
674 | (1) |
|
|
675 | (1) |
|
|
675 | (1) |
|
|
675 | (1) |
|
Failure and Recovery Timing |
|
|
676 | (1) |
|
|
677 | (1) |
|
|
677 | (1) |
|
Spare Parts and Redundancy |
|
|
678 | (1) |
|
|
679 | (5) |
Chapter 20 Risk Management |
|
684 | (36) |
|
An Overview of Risk Management |
|
|
685 | (2) |
|
Example of Risk Management at the International Banking Level |
|
|
685 | (1) |
|
Risk Management Vocabulary |
|
|
686 | (1) |
|
|
687 | (4) |
|
|
688 | (1) |
|
|
688 | (2) |
|
|
690 | (1) |
|
|
691 | (3) |
|
Examples of Business Risks |
|
|
691 | (1) |
|
Examples of Technology Risks |
|
|
692 | (1) |
|
|
692 | (1) |
|
Mission-Essential Functions |
|
|
692 | (1) |
|
Identification of Critical Systems |
|
|
693 | (1) |
|
|
693 | (1) |
|
|
693 | (1) |
|
Risk Mitigation Strategies |
|
|
694 | (1) |
|
|
694 | (1) |
|
|
695 | (1) |
|
User Rights and Permissions Reviews |
|
|
695 | (1) |
|
|
695 | (1) |
|
|
695 | (4) |
|
General Risk Management Model |
|
|
696 | (2) |
|
Software Engineering Institute Model |
|
|
698 | (1) |
|
|
698 | (1) |
|
|
699 | (1) |
|
Qualitatively Assessing Risk |
|
|
699 | (2) |
|
Quantitatively Assessing Risk |
|
|
701 | (4) |
|
Adding Objectivity to a Qualitative Assessment |
|
|
701 | (2) |
|
|
703 | (2) |
|
Qualitative vs. Quantitative Risk Assessment |
|
|
705 | (1) |
|
|
705 | (6) |
|
Penetration Testing Authorization |
|
|
706 | (1) |
|
Vulnerability Testing Authorization |
|
|
706 | (1) |
|
Vulnerability Scanning Concepts |
|
|
706 | (2) |
|
|
708 | (1) |
|
|
709 | (2) |
|
|
711 | (2) |
|
Cost-Effectiveness Modeling |
|
|
712 | (1) |
|
Risk Management Best Practices |
|
|
713 | (3) |
|
|
713 | (1) |
|
|
713 | (1) |
|
Probability/Threat Likelihood |
|
|
714 | (1) |
|
Risks Associated with Cloud Computing and Virtualization |
|
|
714 | (2) |
|
|
716 | (4) |
Chapter 21 Change Management |
|
720 | (18) |
|
|
721 | (2) |
|
The Key Concept: Separation of Duties |
|
|
723 | (1) |
|
Elements of Change Management |
|
|
724 | (2) |
|
Implementing Change Management |
|
|
726 | (1) |
|
|
727 | (1) |
|
The Purpose of a Change Control Board |
|
|
727 | (2) |
|
|
729 | (1) |
|
The Capability Maturity Model Integration |
|
|
729 | (2) |
|
|
731 | (1) |
|
|
731 | (1) |
|
|
731 | (1) |
|
|
731 | (1) |
|
|
732 | (1) |
|
|
732 | (1) |
|
|
732 | (1) |
|
|
733 | (1) |
|
|
734 | (4) |
Chapter 22 Incident Response |
|
738 | (28) |
|
Foundations of Incident Response |
|
|
739 | (4) |
|
|
739 | (1) |
|
Goals of Incident Response |
|
|
740 | (1) |
|
|
740 | (3) |
|
Incident Response Process |
|
|
743 | (13) |
|
|
744 | (2) |
|
|
746 | (2) |
|
Incident Identification/Detection |
|
|
748 | (1) |
|
|
749 | (1) |
|
|
749 | (1) |
|
Containment/Incident Isolation |
|
|
750 | (2) |
|
|
752 | (1) |
|
|
753 | (1) |
|
|
754 | (1) |
|
|
754 | (1) |
|
|
755 | (1) |
|
|
756 | (1) |
|
Standards and Best Practices |
|
|
756 | (5) |
|
|
757 | (1) |
|
|
757 | (1) |
|
|
757 | (1) |
|
|
757 | (2) |
|
Security Measure Implementation |
|
|
759 | (1) |
|
Making Security Measurable |
|
|
760 | (1) |
|
|
761 | (1) |
|
|
762 | (4) |
Chapter 23 Computer Forensics |
|
766 | (26) |
|
|
767 | (3) |
|
|
768 | (1) |
|
|
768 | (1) |
|
Three Rules Regarding Evidence |
|
|
769 | (1) |
|
|
770 | (8) |
|
|
771 | (4) |
|
|
775 | (1) |
|
|
776 | (1) |
|
|
776 | (1) |
|
|
777 | (1) |
|
Conducting the Investigation |
|
|
777 | (1) |
|
|
778 | (2) |
|
|
779 | (1) |
|
Strategic Intelligence/Counterintelligence Gathering |
|
|
779 | (1) |
|
|
780 | (1) |
|
|
780 | (1) |
|
|
780 | (1) |
|
|
781 | (1) |
|
|
781 | (3) |
|
|
781 | (2) |
|
|
783 | (1) |
|
|
784 | (1) |
|
|
784 | (1) |
|
|
785 | (1) |
|
|
785 | (1) |
|
|
786 | (2) |
|
|
786 | (1) |
|
|
787 | (1) |
|
|
787 | (1) |
|
|
788 | (4) |
Chapter 24 Legal Issues and Ethics |
|
792 | (20) |
|
|
793 | (13) |
|
Common Internet Crime Schemes |
|
|
794 | (1) |
|
|
794 | (1) |
|
|
795 | (1) |
|
|
796 | (1) |
|
|
796 | (4) |
|
Payment Card Industry Data Security Standard (PCI DSS) |
|
|
800 | (1) |
|
Import/Export Encryption Restrictions |
|
|
801 | (2) |
|
|
803 | (2) |
|
Digital Rights Management |
|
|
805 | (1) |
|
|
806 | (3) |
|
|
809 | (3) |
Chapter 25 Privacy |
|
812 | (28) |
|
Anonymity and Pseudonymity |
|
|
813 | (1) |
|
Data Sensitivity Labeling and Handling |
|
|
813 | (2) |
|
|
814 | (1) |
|
|
814 | (1) |
|
|
814 | (1) |
|
|
814 | (1) |
|
|
815 | (1) |
|
|
815 | (1) |
|
|
815 | (1) |
|
|
815 | (1) |
|
Data Destruction and Media Sanitization |
|
|
815 | (2) |
|
|
816 | (1) |
|
|
816 | (1) |
|
|
816 | (1) |
|
|
816 | (1) |
|
|
816 | (1) |
|
|
817 | (1) |
|
|
817 | (1) |
|
Personally Identifiable Information (PII) |
|
|
817 | (2) |
|
|
818 | (1) |
|
Notice, Choice, and Consent |
|
|
818 | (1) |
|
Fair Information Practice Principles (FIPPs) |
|
|
819 | (1) |
|
|
820 | (7) |
|
|
821 | (1) |
|
Freedom of Information Act (FOIA) |
|
|
821 | (1) |
|
Family Education Records and Privacy Act (FERPA) |
|
|
822 | (1) |
|
U.S. Computer Fraud and Abuse Act (CFAA) |
|
|
822 | (1) |
|
U.S. Children's Online Privacy Protection Act (COPPA) |
|
|
822 | (1) |
|
Video Privacy Protection Act (VPPA) |
|
|
823 | (1) |
|
Health Insurance Portability and Accountability Act (HIPAA) |
|
|
823 | (1) |
|
Gramm-Leach-Bliley Act (GLBA) |
|
|
824 | (1) |
|
California Senate Bill 1386 (SB 1386) |
|
|
825 | (1) |
|
U.S. Banking Rules and Regulations |
|
|
825 | (1) |
|
Payment Card Industry Data Security Standard (PCI DSS) |
|
|
825 | (1) |
|
Fair Credit Reporting Act (FCRA) |
|
|
826 | (1) |
|
Fair and Accurate Credit Transactions Act (FACTA) |
|
|
826 | (1) |
|
International Privacy Laws |
|
|
827 | (4) |
|
OECD Fair Information Practices |
|
|
827 | (1) |
|
|
827 | (3) |
|
|
830 | (1) |
|
|
830 | (1) |
|
Privacy-Enhancing Technologies |
|
|
831 | (1) |
|
|
832 | (1) |
|
Privacy Impact Assessment |
|
|
832 | (1) |
|
|
833 | (1) |
|
|
833 | (1) |
|
|
834 | (1) |
|
|
834 | (1) |
|
|
835 | (1) |
|
|
835 | (1) |
|
|
836 | (4) |
Appendix A CompTIA Security+ Exam Objectives: SYO-501 |
|
840 | (2) |
Appendix B Command Line Tools |
|
842 | (4) |
|
|
842 | (1) |
|
|
842 | (1) |
|
|
843 | (1) |
|
|
843 | (1) |
|
|
843 | (1) |
|
|
844 | (1) |
|
|
844 | (1) |
|
|
845 | (1) |
Appendix C About the CD-ROM |
|
846 | (4) |
|
|
846 | (1) |
|
|
846 | (1) |
|
Installing and Running Total Tester for Desktop |
|
|
846 | (1) |
|
|
847 | (1) |
|
Single User License Terms and Conditions |
|
|
847 | (1) |
|
|
848 | (1) |
|
|
849 | (1) |
Glossary |
|
850 | (27) |
Index |
|
877 | |